Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Bubu Bhuyan"'
Autor:
Subhrajyoti Deb, Bubu Bhuyan
Publikováno v:
ICT Express, Vol 4, Iss 1, Pp 19-23 (2018)
A secure stream cipher is an effective security solution for applications running on resource-constrained devices. The Grain family of stream ciphers (Grain v1, Grain-128, and Grain-128a) is a family of stream ciphers designed for low-end devices. Si
Externí odkaz:
https://doaj.org/article/fbf29acaf94a4ac49dbb67725dbef756
Publikováno v:
Wireless Personal Communications. 125:577-597
Autor:
Bhupender Kumar, Bubu Bhuyan
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811901041
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b3289d12123c1d3e84b52092d9b35010
https://doi.org/10.1007/978-981-19-0105-8_36
https://doi.org/10.1007/978-981-19-0105-8_36
Autor:
Bubu Bhuyan, Subhrajyoti Deb
Publikováno v:
Multimedia Tools and Applications. 80:19803-19826
In this paper, a new medical image encryption system is proposed using a special nonlinear filter function based linear feedback shift register (LFSR). This special nonlinear filter function based LFSR is used as a pseudo-random number generator (PRN
Publikováno v:
Multiagent and Grid Systems. 16:409-432
Privacy preserved outsourced data access control is a hard task under the control of thirdâparty storage server. To overcome obstacles in the third party based scenario, Attribute-based signcryption system with bilinear pairing tool is one of th
Autor:
Bhupender Kumar, Bubu Bhuyan
Publikováno v:
Procedia Computer Science. 167:2465-2477
Reputation mechanisms of a network or p2p applications can be compromised by a large number of fake or stolen identities recommending higher trust values of a malicious node. A high trust value classify such malicious or selfish nodes as legitimate n
Publikováno v:
Multimedia Tools and Applications. 78:34901-34925
Image encryption is an evolving technique in the arena of data communication. In the last decade, many encryption schemes have been suggested. Unfortunately, most of the current schemes are unable to maintain a balance between security and computatio
Autor:
Bubu Bhuyan, Somen Debnath
Publikováno v:
Multiagent and Grid Systems. 15:99-119
Autor:
Bubu Bhuyan, Somen Debnath
Publikováno v:
Multiagent and Grid Systems. 14:383-401
Autor:
Bubu Bhuyan, Bhupender Kumar
Publikováno v:
Proceedings of the International Conference on Computing and Communication Systems ISBN: 9789813340831
DDoS attacks deplete network bandwidth and render the services unavailable to normal users. In spite of various qualitative and rule based defense mechanisms, the threat persists continuously because such mechanisms do not capture the incentive orien
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b9f93f454ca999f7757816f6ed05e175
https://doi.org/10.1007/978-981-33-4084-8_58
https://doi.org/10.1007/978-981-33-4084-8_58